A new biometrics system could “read” blood vessels under the skin using thermal imaging cameras - a system which its inventors claim...
LulzSecPeru known as one of the most skilled online hackavists are back, this time by the hackers have hacked and defaced the...
The well known Turkish hackers from Turkish Ajan hacking group have hacked into the official website of Sony Electronics (web.sony.it) designated for...
Microsoft has collaborated extensively with the intelligence services of the United States to allow users’ communications details. The company even helped the...
Cyber risk has shot up in importance for company CEOs and senior executives, according to an Ipsos survey for Lloyds Risk Index...
A Kremlin security agency has ordered $15,000 of electric typewriters - sparking international gossip about a return to “old school” security measures.
The Russian newspaper “Izvestia” reported on Thursday that the Federal Protective Service of the country bought 20 typewriters to prevent sensitive information...
A group of hackers claiming to have roots in Afghanistan going with the handle of Afghan Cyber Army has hacked and defaced six...
Governments around the world are recruiting “cyber-mercenaries” - groups of skilled cyber professionals who target institutions such as banks and energy companies,...
“Bug bounties” paid out for finding and reporting bugs and vulnerabilities are a cheap and effective way for companies to bolster their...
A U.S. Government department threw away IT components including printers, computer mice and keyboards in an effort to root out a “sophisticated”...
My colleagues at ESET Ireland, report that an all-too-familiar scam is currently hitting Irish mailboxes. I’ve talked about it at some length...
I made a comment recently that was subsequently quoted in a recent ESET blog – Android “master key” leaves 900 million devices...
The threat of cyber attack loomed over the opening ceremony for the London Olympics last year, officials have revealed.
A sustained brute force cyber attack battered Nintendo’s defences for a month this summer - and allowed cybercriminals access to private data...
An Anonymous hacker going with the handle of Anonymous Jordan has hacked and defaced eight (8) Egyptian Ministry websites against the taking down...
Investment research firm Morningstar says that personal information including credit card numbers for clients, email addresses and passwords may have been compromised...
The online hackavist from Anonymous group has targeted the Hawthorne Police department in response to police shooting a man’s rottweiler dog. As reported by...
Just a few days after the reports on vulnerability in the android devices, more shocking news are disclosed. Now, it is believed...
Android phones have now become a source of income for the cyber criminals. The cyber criminals have began a new type of...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
State-Sponsored Hackers Exploit Two Cisco Zero-Day Vulnerabilities for Espionage
U.S. Treasury Sanctions Iranian Firms and Individuals Tied to Cyber Attacks
Researchers Detail Multistage Attack Hijacking Systems with SSLoad, Cobalt Strike
eScan Antivirus Update Mechanism Exploited to Spread Backdoors and Miners
CoralRaider Malware Campaign Exploits CDN Cache to Spread Info-Stealers
Apache Cordova App Harness Targeted in Dependency Confusion Attack
Unmasking the True Cost of Cyberattacks: Beyond Ransom and Recovery
Russia’s APT28 Exploited Windows Print Spooler Flaw to Deploy ‘GooseEgg’ Malware
ToddyCat Hacker Group Uses Advanced Tools for Industrial-Scale Data Theft
Ransomware Double-Dip: Re-Victimization in Cyber Extortion
Researchers Uncover Windows Flaws Granting Hackers Rootkit-Like Powers
Microsoft Warns: North Korean Hackers Turn to AI-Fueled Cyber Espionage
New RedLine Stealer Variant Disguised as Game Cheats Using Lua Bytecode for Stealth
Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack
Critical Update: CrushFTP Zero-Day Flaw Exploited in Targeted Attacks
BlackTech Targets Tech, Research, and Gov Sectors New ‘Deuterbear’ Tool
Hackers Target Middle East Governments with Evasive “CR4T” Backdoor
OfflRouter Malware Evades Detection in Ukraine for Almost a Decade
FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor